Temporal Access Control on Cloud Data.

Date of Submission

December 2016

Date of Award

Winter 12-12-2017

Institute Name (Publisher)

Indian Statistical Institute

Document Type

Master's Dissertation

Degree Name

Master of Technology

Subject Name

Computer Science


Cryptology and Security Research Unit (CSRU-Kolkata)


Ruj, Sushmita (CSRU-Kolkata; ISI)

Abstract (Summary of the Work)

Cloud storage is a model of data storage in which the digital data is stored in remote server. The physical storage spans multiple servers (and often locations), and the physical environment is typically owned and managed by a hosting company. These cloud storage providers are responsible for keeping the data available and accessible. Generally data is used to store in cloud without any encryption. But The two big concerns about cloud storage are reliability and security. Clients are not likely to entrust their data to another company without a guarantee that they will be able to access their information whenever they want and no one else will be able to get at it. One solution of these problem is temporal access control which is based on attribute based encryption.Attribute-based access control is one of the most important security mechanisms for data storage, especially in cloud computing. Attribute-based encryption is an attribute-based access control mechanism which requires data to be kept encrypted at servers. This data is open to access to all, but can be decrypted only by those users whose attributes satisfy a given access policy. Also the data owner can revoke any authorized user from decrypting the data in any point of time. An issue in attributebased encryption is huge time complexities for generating the keys and encrypting the content. The problem becomes critical when the number of attributes is large, however little work has been done to develop schemes that support efficient and reliable storage of data in cloud with temporal access control. Here, we review some of the important work that has been done in this field. We then present a protocol which improves the efficiency, scalibilty and makes it feasible for real time implementation. We also analyze it’s time and communication complexity to demonstrate the efficiency of our methodology. Another merit of our scheme is that the computationally intense task is outsourced to the cloud without compromising on the security of the scheme. In this way, we propose a comprehensive scheme which promises encompass all the major issues in attribute-based encryption.


ProQuest Collection ID: http://gateway.proquest.com/openurl?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&res_dat=xri:pqm&rft_dat=xri:pqdiss:28843359

Control Number


Creative Commons License

Creative Commons Attribution 4.0 International License
This work is licensed under a Creative Commons Attribution 4.0 International License.



This document is currently not available here.